Individual Verifiability with Return Codes: Manipulation Detection Efficacy

Paul Tim Thürwächter, Melanie Volkamer, Oksana Kulyk

Research output: Conference Article in Proceeding or Book/Report chapterArticle in proceedingsResearchpeer-review

Abstract

Abstract. Researchers advocate for end-to-end verifiable voting
schemes to maximise election integrity. At E-Vote-ID 2021, Kulyk et al.
proposed to extend the verifiable scheme used in Switzerland (called original scheme) by voting codes to improve it with respect to vote secrecy.
While the authors evaluated the general usability of their proposal, they
did not evaluate its efficacy with respect to manipulation detection by
voters. To close this gap, we conducted a corresponding user study. Furthermore, we study the effect of a video intervention (describing the vote
casting process including individual verifiabilty steps) on the manipulation detection rate. We found that 65% of those receiving the video
detected the manipulation and informed the support. If we only consider
those who stated they (partially) watched the video the rate is 75%. The
detection rate for those not having provided the video is 63%. While
these rates are significantly higher than the 10% detection rate reported
in related work for the original system, we discuss how to further increase
the detection rate
Original languageEnglish
Title of host publicationInternational Joint Conference on Electronic Voting
Number of pages17
PublisherSpringer
Publication date2022
Pages139 - 156
Publication statusPublished - 2022
EventSeventh International Joint Conference on Electronic Voting: E-Vote-ID 2022 -
Duration: 4 Oct 20227 Oct 2022

Conference

ConferenceSeventh International Joint Conference on Electronic Voting
Period04/10/202207/10/2022

Keywords

  • end-to-end verifiability
  • voting schemes
  • vote secrecy
  • manipulation detection
  • video intervention

Fingerprint

Dive into the research topics of 'Individual Verifiability with Return Codes: Manipulation Detection Efficacy'. Together they form a unique fingerprint.

Cite this